http-sniffer Logo

http-sniffer

0
Free
Visit Website

A multi-threading tool to sniff HTTP header records beyond TCP flow statistics, supporting both offline PCAP file and live NIC sniffing. It exports statistics of TCP flows, HTTP request/response pairs, and supports JSON format output. Dependencies include libpcap for traffic packet extraction, json-c for JSON parsing, and scons for project building. To use, run 'scons' in the root folder to compile, then specify the live interface with 'ifconfig' in the terminal (e.g., en0) or store output flows as JSON. Output includes brief CSV format.

FEATURES

ALTERNATIVES

A network protocol analyzer for capturing and analyzing network traffic with a focus on TCP/IP flow reconstruction and response time tracking.

An analyzer for parsing GQUIC traffic in Zeek, supporting versions Q039 to Q046, with a fingerprinting method named 'CYU' for detecting anomalous GQUIC traffic.

Sniffglue is a network sniffer tool written in Rust with advanced filter sensitivity options and secure packet processing.

SSHGuard protects hosts from brute-force attacks by monitoring system logs, detecting attacks, and blocking attackers using a firewall.

Scan the internet for publicly exposed network components

A WebSocket Manipulation Proxy with a user interface to capture, intercept, and send custom messages for WebSocket and Socket.IO communications.

AWS Network Firewall provides fine-grained control over network traffic and enables easy deployment of firewall security.

A Python library for working with network protocols

PINNED